Padding Oracle vulnerability in Apache Druid extension, druid-pac4j.
This could allow an attacker to manipulate a pac4j session cookie.
This issue affects Apache Druid versions 0.18.0 through 30.0.0.
Since the druid-pac4j extension is optional and disabled by default, Druid installations not using the druid-pac4j extension are not affected by this vulnerability.
While we are not aware of a way to meaningfully exploit this flaw, we
nevertheless recommend upgrading to version 30.0.1 or higher which fixes the issue
and ensuring you have a strong
druid.auth.pac4j.cookiePassphrase as a precaution.
References
Link | Resource |
---|---|
https://lists.apache.org/thread/gr94fnp574plb50lsp8jw4smvgv1lbz1 | Vendor Advisory |
http://www.openwall.com/lists/oss-security/2024/09/17/1 |
Configurations
History
14 Mar 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-209 |
Information
Published : 2024-09-17 19:15
Updated : 2025-03-14 20:15
NVD link : CVE-2024-45384
Mitre link : CVE-2024-45384
CVE.ORG link : CVE-2024-45384
JSON object : View
Products Affected
apache
- druid
CWE